<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Destination NAT with PBF in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-with-pbf/m-p/44071#M32355</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Personally I dont think it really matters if it says .0 or .8 as with 4.1 series where even 4.1.8 had one or another serious bug.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I understand 5.0.0 contains the same fixes as 4.1.9 so if you are happy to run 4.1.9 you should be equally happy to run 5.0.0.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 20 Nov 2012 00:27:43 GMT</pubDate>
    <dc:creator>mikand</dc:creator>
    <dc:date>2012-11-20T00:27:43Z</dc:date>
    <item>
      <title>Destination NAT with PBF</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-with-pbf/m-p/44068#M32352</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a question if Destination NAT with PBF is supported.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have two site A and B. All internet bound traffic is supposed to go out site A. Site B sends its traffic over a VPN tunnel to site A due to a default route. There are however some devices that rely on the public IP's given to us so I had to maintain the static NAT locally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The solution I came up with was a PBF that would take the traffic from these servers and if destined for public it would send out the local internet facing port with its static nat and if it was internal it would go over the VPN tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem I am having is that site B's firewall is NAT'ing the incoming traffic correctly according to logs and packet captures but the return traffic is getting lost somewhere. When I did not have the PBF in and all traffic heading out locally the static NAT's worked perfectly. I was able to also test to make sure the outbound traffic for these devices headed out site B and they do. So I do not know where the packet is getting lost. According to the packet captures on the firewall I see the correct addresses but the 3-way handshake is never completing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone have any ideas? I was thinking about going with virtual routers but these servers are mixed between trust and dmz traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Nov 2012 00:40:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-with-pbf/m-p/44068#M32352</guid>
      <dc:creator>andrew85</dc:creator>
      <dc:date>2012-11-19T00:40:15Z</dc:date>
    </item>
    <item>
      <title>Re: Destination NAT with PBF</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-with-pbf/m-p/44069#M32353</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Would the new return to sender feature in PANOS 5.0 be something of your taste?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;Symmetric Return (Return to Sender) – This feature extends the functionality of Policy Based Forwarding (PBF) rules to circumvent the route lookup process and the subsequent PBF lookup for return traffic (server to client). The firewall will use the original incoming interface as the egress interface. If the source IP is in the same subnet as the incoming interface on the firewall, symmetric return will not take effect. This feature is useful when you have servers accessible through two ISP connections (on different ingress interfaces) and the return traffic must be routed through the ISP that originally routed the session. &lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Nov 2012 08:27:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-with-pbf/m-p/44069#M32353</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-11-19T08:27:08Z</dc:date>
    </item>
    <item>
      <title>Re: Destination NAT with PBF</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-with-pbf/m-p/44070#M32354</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes that sounds like it would fix the issue however, we are really hesitant to jump on a .0 release. Usually wait for a couple of hot fixes to roll in.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Nov 2012 19:21:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-with-pbf/m-p/44070#M32354</guid>
      <dc:creator>andrew85</dc:creator>
      <dc:date>2012-11-19T19:21:46Z</dc:date>
    </item>
    <item>
      <title>Re: Destination NAT with PBF</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-with-pbf/m-p/44071#M32355</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Personally I dont think it really matters if it says .0 or .8 as with 4.1 series where even 4.1.8 had one or another serious bug.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I understand 5.0.0 contains the same fixes as 4.1.9 so if you are happy to run 4.1.9 you should be equally happy to run 5.0.0.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Nov 2012 00:27:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-with-pbf/m-p/44071#M32355</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-11-20T00:27:43Z</dc:date>
    </item>
  </channel>
</rss>

